Download presentation
Presentation is loading. Please wait.
Published byGavin Knight Modified over 9 years ago
1
Adma Archana CSC532 TERM PAPER LOUISIANA TECH UNIVERSITY DATABASE REVERSE ENGINEERING
2
INTRODUCTION Database Reverse Engineering provides solution to the necessity for scientifically rebuilding the lost documentation of current systems that are to be maintained and to evolve in a world of increasingly complex technology Database Reverse Engineering provides solution to the necessity for scientifically rebuilding the lost documentation of current systems that are to be maintained and to evolve in a world of increasingly complex technology
3
REVERSE ENGINEERING Reverse Engineering a piece of software involves recovering or reconstructing its functional and technical specifications, starting mainly from the source code of the programs. It is a Reverse Engineering a piece of software involves recovering or reconstructing its functional and technical specifications, starting mainly from the source code of the programs. It is a Complex Complex Painful & Painful & Prone-to-failure activity. Prone-to-failure activity.
4
Reverse Engineering the data components of the application first, can be much more efficient than trying to cope with the whole application. Reverse Engineering the data components of the application first, can be much more efficient than trying to cope with the whole application. Narrow semantic distance for data than for procedural parts Narrow semantic distance for data than for procedural parts Data is the most stable part of applications Data is the most stable part of applications Semantic structure underlying file structures is procedure independent Semantic structure underlying file structures is procedure independent
5
Database design is made up of a sequence of four processes: Database design is made up of a sequence of four processes: Conceptual Design Conceptual Design Logical Design Logical Design Schema Simplification Schema Simplification Schema Optimization Schema Optimization Schema Translation Schema Translation Physical Design Physical Design View Design View Design
6
Reverse Engineering any Database consists of two major processes: Reverse Engineering any Database consists of two major processes: Data Structure Extraction Data Structure Extraction Data Structure Conceptualization Data Structure Conceptualization
8
Data Structure Extraction: produces a complete description of the data structures according to the model of the DMS Data Structure Extraction: produces a complete description of the data structures according to the model of the DMS Data Structure Conceptualization: tries to make the semantics of the logical schema explicit by recovering the intention of the optimized DMS data structures Data Structure Conceptualization: tries to make the semantics of the logical schema explicit by recovering the intention of the optimized DMS data structures
10
Untranslation: Inverse of Schema Translation forward process Untranslation: Inverse of Schema Translation forward process De-optimization: Inverse of Schema Optimization forward process De-optimization: Inverse of Schema Optimization forward process Conceptual Normalization: intended to recover high level structures transformed by the Schema Specification Conceptual Normalization: intended to recover high level structures transformed by the Schema Specification
11
SPECIFIC DBRE PROBLEMS Weakness of the DBMS models Weakness of the DBMS models Implicit Structures Implicit Structures Optimized Structures Optimized Structures Awkward Design Awkward Design Obsolete Constructs Obsolete Constructs Cross-model influence Cross-model influence
12
DBRE TOOLS Microsoft Visio 2002 Professional Edition * Microsoft Visio 2002 Professional Edition * (Microsoft, IBM, Oracle, Sybase, others via ODBC) (Microsoft, IBM, Oracle, Sybase, others via ODBC) CASE Studio 2 – Database Modeling tool CASE Studio 2 – Database Modeling tool Dezign for databases - Datanamic Dezign for databases - Datanamic
13
Conclusion Database Reverse Engineering tools can contribute to the program understanding – which a modest goal of software reverse engineering Database Reverse Engineering tools can contribute to the program understanding – which a modest goal of software reverse engineering
14
REFERENCES http://citeseer.nj.nec.com/cache/papers/cs/12031/http:zSzzSzwww.i nfo.fundp.ac.bezSz~dbmzSzDOCUMENTSzSzdbrebook.pdf/hainaut98 database.pdf** http://citeseer.nj.nec.com/cache/papers/cs/12031/http:zSzzSzwww.i nfo.fundp.ac.bezSz~dbmzSzDOCUMENTSzSzdbrebook.pdf/hainaut98 database.pdf** http://citeseer.nj.nec.com/cache/papers/cs/12031/http:zSzzSzwww.i nfo.fundp.ac.bezSz~dbmzSzDOCUMENTSzSzdbrebook.pdf/hainaut98 database.pdf http://citeseer.nj.nec.com/cache/papers/cs/12031/http:zSzzSzwww.i nfo.fundp.ac.bezSz~dbmzSzDOCUMENTSzSzdbrebook.pdf/hainaut98 database.pdf http://citeseer.nj.nec.com/cache/papers/cs/16137/ftp:zSzzSzftp.info.fundp.ac.bezSzpubzSzpublicationszSzRPzSzRP-95- 013.pdf/hainaut95requirement.pdf http://citeseer.nj.nec.com/cache/papers/cs/16137/ftp:zSzzSzftp.info.fundp.ac.bezSzpubzSzpublicationszSzRPzSzRP-95- 013.pdf/hainaut95requirement.pdf http://citeseer.nj.nec.com/cache/papers/cs/16137/ftp:zSzzSzftp.info.fundp.ac.bezSzpubzSzpublicationszSzRPzSzRP-95- 013.pdf/hainaut95requirement.pdf http://citeseer.nj.nec.com/cache/papers/cs/16137/ftp:zSzzSzftp.info.fundp.ac.bezSzpubzSzpublicationszSzRPzSzRP-95- 013.pdf/hainaut95requirement.pdf http://citeseer.nj.nec.com/cache/papers/cs/25379/ftp:zSzzSzftp.info.fundp.ac.bezSzpubzSzpublicationszSzRPzSzRP-98- 004.pdf/henrard98program.pdf http://citeseer.nj.nec.com/cache/papers/cs/25379/ftp:zSzzSzftp.info.fundp.ac.bezSzpubzSzpublicationszSzRPzSzRP-98- 004.pdf/henrard98program.pdf http://citeseer.nj.nec.com/cache/papers/cs/25379/ftp:zSzzSzftp.info.fundp.ac.bezSzpubzSzpublicationszSzRPzSzRP-98- 004.pdf/henrard98program.pdf http://citeseer.nj.nec.com/cache/papers/cs/25379/ftp:zSzzSzftp.info.fundp.ac.bezSzpubzSzpublicationszSzRPzSzRP-98- 004.pdf/henrard98program.pdf http://404.ieplugin.com/404.cgi?404=http://www.sei.cmu.edu/pub/ documents/99.reports/pdf/99tr010.pdf-reengineering http://404.ieplugin.com/404.cgi?404=http://www.sei.cmu.edu/pub/ documents/99.reports/pdf/99tr010.pdf-reengineering http://404.ieplugin.com/404.cgi?404=http://www.sei.cmu.edu/pub/ documents/99.reports/pdf/99tr010.pdf-reengineering http://404.ieplugin.com/404.cgi?404=http://www.sei.cmu.edu/pub/ documents/99.reports/pdf/99tr010.pdf-reengineering http://citeseer.nj.nec.com/cache/papers/cs/27089/http:zSzzSzwww.i nfo.fundp.ac.bezSz~dbmzSzpublicationzSz2002zSzwcre02.pdf/strate gies-for-data-reengineering.pdf http://citeseer.nj.nec.com/cache/papers/cs/27089/http:zSzzSzwww.i nfo.fundp.ac.bezSz~dbmzSzpublicationzSz2002zSzwcre02.pdf/strate gies-for-data-reengineering.pdf http://citeseer.nj.nec.com/cache/papers/cs/27089/http:zSzzSzwww.i nfo.fundp.ac.bezSz~dbmzSzpublicationzSz2002zSzwcre02.pdf/strate gies-for-data-reengineering.pdf http://citeseer.nj.nec.com/cache/papers/cs/27089/http:zSzzSzwww.i nfo.fundp.ac.bezSz~dbmzSzpublicationzSz2002zSzwcre02.pdf/strate gies-for-data-reengineering.pdf
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.